Chen H. Homeland security data mining using social network analysis. In: Ortiz-Arroyo D, Larsen H.L, Zend D.D, Hicks D, Wagner G, eds. IEEE Intelligence and Security Informatics Lecture Notes in Computer Science. vol. 5376. Springer; 2008.
Dale R, Moisl H, Somers H.L. Handbook of Natural Language Processing. New York: Marcel Dekker; 2000.
Danks D, Griffiths T.L, Tenenbaum J.B. Dynamical causal learning. In: Becker S, Thrun S, Obermayer K, eds. Advances in Neural Information Processing Systems. vol. 15. Cambridge, MA. MIT Press; 2002:67–74.
Dhamija R, Tygar J.D, Hearst M. Why phishing works. In: CHI 2006. April 22–27, 2006 Montreal, Canada.
Dhamija R, Tygar J.D. The battle against phishing: dynamic security skins. In: SOUPS 2005: Proceedings of the 2005 ACM Symposium on Usable Security and Privacy, ACM International Conference Proceedings Series. ACM Press; July 2005:77–88.
Ghazi A, Laskey K, Wang X, Barbará D, Shackelford T, Wright E, Fitzgerald J. Detecting threatening behavior using Bayesian networks. In: Conference on Behavioral Representation in Modeling and Simulation. 2006.
The Guardian. The Guardian. Thursday, December 27, 2012 [Online]. Available from: http://www.theguardian.com/media/2012/dec/27/social-media-crime-facebook-twitter (accessed 24.06.14.).
Jakobsson M. Modeling and preventing phishing attacks. In: Patrick A.S, Yung M, eds. FC 2005. LNCS. vol. 3570. Heidelberg: Springer; 2005.
Korhonen A, Krymolowski Y, Briscoe T. A large subcategorisation lexicon for natural language processing applications. In: Proceedings of the 5th International Conference on Language Resources and Evaluation. 2006.
Krebs V.E. Uncloaking terrorist networks. First Monday. 2002;7(4).
Kuipers B.J. Causal reasoning in medicine: analysis of a protocol. Cognitive Science. 1984;8:363–385.
Laporte E. Symbolic natural language processing. In: Lothaire, ed. Applied Combinatorics on Words. Cambridge University Press; 2005:164–209.
Lau R.Y, Yunqing X, Yunming Y. A probabilistic generative model for mining cybercriminal networks from online social Media. Computational Intelligence Magazine. 2014;9(1):31–43.
Lévy P. Collective Intelligence: Mankind’s Emerging World in Cyberspace. Basic Books; 1994.
Liddy E.D. A robust risk minimization based named entity recognition system. In: Encyclopedia of Library and Information Science. Marcel Decker, Inc; 2001.
Manning C.D, Schütze H. Foundations of Statistical Natural Language Processing. MIT Press; 1999.
McKenna J.A. The internet and social life. Annual Review of Psychology. 2004;55:573–590.
Nielsen T.D, Verner Jensen F. Bayesian Networks and Decision Graphs. Springer Science & Business Media; 2009.
Pearl J. Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Inference. San Francisco: Morgan Kaufmann Publishers Inc.; 1998.
Poelmans J, Elzinga P, Viaene S, Dedene G. Formal concept analysis in knowledge discovery: a survey. In: Croituru M, Ferré S, Lukose D, eds. ICCS 2010, LNAI 6208. Springer-Verlag Berlin Heidelberg; 2010:139–153.
Sanchez-Graillet O, Poesio M. Acquiring Bayesian Networks from Text LREC 2004, Lisbon, Portugal. 2004.
Schoder D, Gloor P, Metaxas P. Social media and collective intelligence – ongoing and future research streams. KI – Künstliche Intelligenz. 2013;27(1):9–15.
Schwartz M.J. Epsilon Fell to Spear-Phishing Attack. Information Week. Friday, November 4, 2011 [Online]. Available from: http://www.darkreading.com/attacks-and-breaches/epsilon-fell-to-spear-phishing-attack/d/d-id/1097119? (accessed 17.06.14.).
Shashidhar J, Chen N. A phishing model and its applications to evaluating phishing attacks. In: Proceedings of the 2nd International Cyber Resilience Conference, Perth, Australia, August 1–2, 2011. 2011.
Smith S.T, Senne K.D, Philips S, Kao E.K, Bernstein G. Covert network detection. Lincoln Laboratory Journal. 2013;20(1).
Stahlschmidt S, Tausendteufel H. Bayesian networks for sex-related homicides: structure learning and prediction. Journal of Applied Statistics. 2013;40(6):1155–1171.
Stumme G. Efficient Data Mining Based on Formal Concept Analysis. Lecture Notes in Computer Science. vol. 2453. Springer Berlin Heidelberg; 2002.
Troussov A, Levner E, Bogdan C, Judge J, Botvich D. Spreading activation methods. In: Dynamic and Advanced Data Mining for Progressing Technological Development: Innovations and Systemic Approaches. 2010:136–167.
Turing A.M. Computing machinery and intelligence. Mind. 1950;49:433–460.
Wilks Y, Stevenson M. The grammar of sense: using part-of-speech tags as a first step in semantic disambiguation. Natural Language Engineering. 1998;4:135–143.